TL;DR summary of stories on the internet
In this web content, the author discusses the structure of the Roman Republic during the third and second centuries, specifically focusing on the offices of praetor and consul. These offices are the highest in the Roman Republic and hold direct military and judicial authority. The author highlights the competitive nature of these offices, as politicians […]
Read more »
Xiaomi CyberDog 2 is the latest addition to Xiaomi’s line of smart robo-dogs. At a recent launch event, Lei Jun unveiled several new products, including the CyberDog 2, which represents a leap forward in the field of robotics with its advanced AI capabilities and realistic features. Xiaomi Academy engineers first introduced the CyberDog series in […]
We have developed an extension called pg_later for Postgres that allows for asynchronous query execution. This means that you can submit a query and retrieve the results later at your convenience. This feature is particularly useful for long-running maintenance jobs or analytical queries. With pg_later, you can queue up these tasks and continue with other […]
In this post, the author discusses how the C and C++ programming languages prioritize performance over correctness. They highlight the concept of “undefined behavior” introduced in the ANSI C standard, where certain aspects of the language were left to implementation-dependent interpretation. Examples include uninitialized variables, signed integer overflow, infinite loops, and null pointer usage. The […]
The author recounts the challenges they faced during the relaunch of their ecommerce website. They initially chose AngularJS for the first website, which lacked server-side rendering and resulted in slow load times. They decided to switch to Angular 2, which had an experimental server-side rendering feature branch. However, they struggled with massive bundle sizes and […]
This page provides links to the slides and code from a talk on “Railway Oriented Programming.” In functional programming, many examples assume everything goes smoothly, but real-world applications require handling validation, errors, and other challenges. This talk introduces a clean functional approach using a railway analogy. The author plans to upload posts on these topics […]
Professor Ori Bar-Nur and his team at ETH Zurich have successfully grown mouse muscle cells in the laboratory using a new approach. By reprogramming connective tissue cells into muscle stem cells using a cocktail of small molecules and proteins, the researchers were able to produce large quantities of muscle cells. Unlike previous methods that used […]
The author argues that the FBI cannot be trusted with conducting foreign intelligence queries on American individuals, as evidenced by yet another instance of the bureau violating privacy and civil liberties. Despite reforms touted by the FBI, they conducted unauthorized searches on the communications of a state senator and a U.S. senator. This highlights the […]
The `su` command allows one user to temporarily assume the identity of another user. By default, `su` assumes the identity of the superuser, but a different user can be specified. When using `su`, the user’s password is required unless the command is run by the superuser. The default shell for the user is used, or […]
In a multinational cohort study, researchers evaluated the risk of cancer mortality after protracted low dose exposure to ionising radiation in workers in France, the UK, and the US. The study included 309,932 workers with a total follow-up of 10.7 million person years. They found that the rate of mortality due to solid cancer increased […]